SlideShare a Scribd company logo
Recipient                          Reason                                 Follow Up
Date:             11/11/2008                 Calling to schedule time to come and fix computer.   JL returned call and
Time:                 3:30pm                                                                      scheduled time for
Caller Name:        Bob Levy        JL                                                            11/13/08 at 10am.
Company Name:             Dell
Phone Number:   555-555-5555
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:
Date:
Time:
Caller Name:
Company Name:
Phone Number:

More Related Content

More from Confidential

101 powerfulwaystousethelawofattraction (1)
101 powerfulwaystousethelawofattraction (1)101 powerfulwaystousethelawofattraction (1)
101 powerfulwaystousethelawofattraction (1)Confidential
 
4 leadership messages your talent needs to hear forbes
4 leadership messages your talent needs to hear   forbes4 leadership messages your talent needs to hear   forbes
4 leadership messages your talent needs to hear forbesConfidential
 
Job interview mistakes 2
Job interview mistakes  2Job interview mistakes  2
Job interview mistakes 2Confidential
 
Job interview mistakes 1
Job interview mistakes 1Job interview mistakes 1
Job interview mistakes 1Confidential
 
Wisdom for-managers
Wisdom for-managersWisdom for-managers
Wisdom for-managersConfidential
 
Finding jobs through craigslist
Finding jobs through craigslistFinding jobs through craigslist
Finding jobs through craigslistConfidential
 
Acquire power through self development
Acquire power through self developmentAcquire power through self development
Acquire power through self developmentConfidential
 
25 simple-strategies-to-boost-your-creativity (1)
25 simple-strategies-to-boost-your-creativity (1)25 simple-strategies-to-boost-your-creativity (1)
25 simple-strategies-to-boost-your-creativity (1)Confidential
 
Start a local produce business
Start a local produce businessStart a local produce business
Start a local produce businessConfidential
 
How to start a green housecleaning business
How to start a green housecleaning businessHow to start a green housecleaning business
How to start a green housecleaning businessConfidential
 
Start a home organizing business
Start a home organizing businessStart a home organizing business
Start a home organizing businessConfidential
 
Start an errand business
Start an errand businessStart an errand business
Start an errand businessConfidential
 
22 powerfultoolstotransformyourfear new1
22 powerfultoolstotransformyourfear new122 powerfultoolstotransformyourfear new1
22 powerfultoolstotransformyourfear new1Confidential
 
Mastery of-money-and-romance
Mastery of-money-and-romanceMastery of-money-and-romance
Mastery of-money-and-romanceConfidential
 
10 benefits of_a_linked_in_profile
10 benefits of_a_linked_in_profile10 benefits of_a_linked_in_profile
10 benefits of_a_linked_in_profileConfidential
 
Your mindyourlifejournal
Your mindyourlifejournalYour mindyourlifejournal
Your mindyourlifejournalConfidential
 
Words ofwisdom1 (1)
Words ofwisdom1 (1)Words ofwisdom1 (1)
Words ofwisdom1 (1)Confidential
 

More from Confidential (20)

101 powerfulwaystousethelawofattraction (1)
101 powerfulwaystousethelawofattraction (1)101 powerfulwaystousethelawofattraction (1)
101 powerfulwaystousethelawofattraction (1)
 
4 leadership messages your talent needs to hear forbes
4 leadership messages your talent needs to hear   forbes4 leadership messages your talent needs to hear   forbes
4 leadership messages your talent needs to hear forbes
 
Job interview mistakes 2
Job interview mistakes  2Job interview mistakes  2
Job interview mistakes 2
 
Job interview mistakes 1
Job interview mistakes 1Job interview mistakes 1
Job interview mistakes 1
 
Achieving self
Achieving selfAchieving self
Achieving self
 
Skills summary
Skills summarySkills summary
Skills summary
 
Wisdom for-managers
Wisdom for-managersWisdom for-managers
Wisdom for-managers
 
Finding jobs through craigslist
Finding jobs through craigslistFinding jobs through craigslist
Finding jobs through craigslist
 
Acquire power through self development
Acquire power through self developmentAcquire power through self development
Acquire power through self development
 
25 simple-strategies-to-boost-your-creativity (1)
25 simple-strategies-to-boost-your-creativity (1)25 simple-strategies-to-boost-your-creativity (1)
25 simple-strategies-to-boost-your-creativity (1)
 
Start a local produce business
Start a local produce businessStart a local produce business
Start a local produce business
 
How to start a green housecleaning business
How to start a green housecleaning businessHow to start a green housecleaning business
How to start a green housecleaning business
 
Start a home organizing business
Start a home organizing businessStart a home organizing business
Start a home organizing business
 
Start an errand business
Start an errand businessStart an errand business
Start an errand business
 
22 powerfultoolstotransformyourfear new1
22 powerfultoolstotransformyourfear new122 powerfultoolstotransformyourfear new1
22 powerfultoolstotransformyourfear new1
 
Mastery of-money-and-romance
Mastery of-money-and-romanceMastery of-money-and-romance
Mastery of-money-and-romance
 
10 benefits of_a_linked_in_profile
10 benefits of_a_linked_in_profile10 benefits of_a_linked_in_profile
10 benefits of_a_linked_in_profile
 
Your mindyourlifejournal
Your mindyourlifejournalYour mindyourlifejournal
Your mindyourlifejournal
 
Words ofwisdom1
Words ofwisdom1Words ofwisdom1
Words ofwisdom1
 
Words ofwisdom1 (1)
Words ofwisdom1 (1)Words ofwisdom1 (1)
Words ofwisdom1 (1)
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Phone log

  • 1. Recipient Reason Follow Up Date: 11/11/2008 Calling to schedule time to come and fix computer. JL returned call and Time: 3:30pm scheduled time for Caller Name: Bob Levy JL 11/13/08 at 10am. Company Name: Dell Phone Number: 555-555-5555 Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date:
  • 2. Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name:
  • 3. Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: Date: Time: Caller Name: Company Name: Phone Number: